0% found this document useful (0 votes)
4 views4 pages

EMINENCE COMPUTING

The document is an examination paper for a computing subject for Class Eminence (7) at Webstar School Complex. It includes theory questions covering topics such as copyright infringement, information security, intellectual property, programming, and social media, as well as objective questions with multiple-choice answers. The exam has a total duration of 2 hours and 30 minutes and is divided into theory (100 marks) and objectives (40 marks).

Uploaded by

agyafoemmanuel8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views4 pages

EMINENCE COMPUTING

The document is an examination paper for a computing subject for Class Eminence (7) at Webstar School Complex. It includes theory questions covering topics such as copyright infringement, information security, intellectual property, programming, and social media, as well as objective questions with multiple-choice answers. The exam has a total duration of 2 hours and 30 minutes and is divided into theory (100 marks) and objectives (40 marks).

Uploaded by

agyafoemmanuel8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

WEBSTAR SCHOOL COMPLEX

END OF SECOND TRIMESTER EXAMINATION


SUBJECT: COMPUTING Duration: 2hr30mins
CLASS: EMINENCE (7)
Name: …………………………………………………………………………………… Date: …………………….
THEORY(100MARKS)
ANSWER FOUR (4) QUESTIONS FROM THS SECTION
1.a. Explain the concept of copyright infringement.
b. Explain the following computer programming terminologies.
i. Bug
ii. Iteration
iii. Code
c. Copy and complete the table below
DATA TYPES TWO EXAMPLES
Floats
String
1, 3, 5, 28, -3673
TRUE, FALSE
Character (Char)
2.a. i. In your own words, express your opinion on Information Security
ii. Write an algorithm of the activities that takes place in school before 1 st period.
iii. Mention two (2) Micro blogging sites
b. Complete the diagram below displaying the principles of information security.
 Application  ................
Access layer Access layer

...........................

 ..................... ...............
............... Data In Motion
access layer layer

c. What is the full meaning of acronyms?


i. ASCII
ii. API
iii. CIA
3.a. i. What is an intellectual property?
May The Lord Be With You Enjoy Your Easter Festivities
ii. Define computer-Related Disorder.
iii. Draw the trademark logo for Tesla.
b. State and explain four intellectual property rights.
c. i. What is a computer threat?
ii. Write down three (3) computer threat.
iii. State four (4) devices needed to set up a computer network.
4.a. i. What is meant “programming”?
ii. Draw two network topologies.
b. i. Explain the term “ freeware”
ii. What is the punishment for an individual who violates copyright laws?
iii. State three computer-related disorders.
c. Mention four (4) video-sharing social media sites.
5.a. i. What is “social media”?
ii. Outline the types of social media sites
iii. Define an “Algorithm”
b. i. Write down the three types of patent.
ii. State three (3) input devices.
iii. What is a “Sequence” in an algorithm?
c. What is a “Linear search”?
ii. Write a simple algorithm on how to make an electromagnet.

OBJECTIVES(40MARKS)
Choose from the alternatives lettered A-D the right answers to the questions below
1. The process of developing and implementing various sets of instructions given to the
computer to perform certain predefined tasks is ………… a. Computer assembly b.
Computer programming c. Computer architecture d. Computational thinking
2. The sets of related objects with common properties in programming is known as
………………… a. Array b. Arguments c. Class d. Char
3. The expression used for creating statements that are either TRUE or FALSE is known as
……… a. Pseudo code b. Bug c. Algorithm d. Boolean
4. Another name for microchip is ………………… a. advanced circuit b. Motherboard
c. Integrated circuit d. Integrated board
5. One gigabyte(GB) equivalence to megabytes (MB) is ………………… a. 1000 b. 10000
c. 1024 d. 10024
6. The CIA Triads includes Confidentiality, Availability and ………………… a. Integrity
b. Information c. Intel d. Interface
7. The type of software that is distributed free of charge to prospective customers in a
limited format is called ………………… a. Freeware b. Shareware c. Cripple ware
d. Expensive ware
8. Which of the following is not a punishment for a culprit for copyright infringement?
A. Imprisonment b. Fine c. Capital Punishment d. Reputational consequences

May The Lord Be With You Enjoy Your Easter Festivities


9. The most commonly used cable for a network connection is ………………… a. Ethernet
cables b. Optic cables c. Fiber cables d. Coaxial cables
10.………………… is a blogging platform that makes it easy for users to post images, gifs,
videos, music, text, links, and more. A. Tumblr b. Thumbnail c. Instagram
d. LinkedIn
11.Which of the following of he following is not a social media site? A. X b. Zoho
c. WhatsApp d. Facebook
12.A group of similar types of data is called ………………… a. API b. Array c. Bug
d. Boolean
13.A general term used to denote an unexpected error in a program is called …………………
a. Bug b. Code c. Char d. Object
14.Which of the following is not a programming language? A. C++ b. Java c. Ruby
d. Telegram
15.Which of these is not a floating point data? A. 1.57E b. 1.23 c. -15.48 d. YES
16.A term used to describe a written set of instructions using the protocol of a particular
language is called ………………… a. Code b. Boolean c. Integer d. JavaScript
17.Who invented the Boolean data type? ………………… Boole a. George b. Jonas
c. Bernard d. Benzema
18.In the context of programming, the data type used to represent real numbers that do
not have a fractional value is termed as ………………… a. Float b. Integer c. String
d. Char
19.Which patent applies to anyone who creates a new design for a product? A. Design
patent b. Plant patent c. Slogan patent d. Intention patent
20.All are types of cybercrime except ………………… a. Credit card fraud b. Identity
theft c. Killing d. Cyber bullying
21.What is the first pillar of the network and data security? A. Confidentiality
b. Integrity c. Availability d. Fabrication
22.Which symbol denotes a copyrighted document? A. @ B. ® C. © d. Ω
23.………………… is a term used to describe a term that do not change in a code.
A. Variable b. constant c. package c. Anchor
24.What is the language of a computer system? A. Binary c. Pseudo c. Syntax
b. Algorithm
25.………………… search is a simple search algorithm. A. Linear b. Rectilinear
c. Lateral d. Vertical
26.The repetition of steps and instructions over and over again in a programming is
referred to as ………………… a. Decomposition b. Iteration c. Sequence
d. Selection
27.Decision making or question in a algorithm is termed as ………………… a. Sequence
b. Selection c. loop d. Abstraction
28.The data form that hold one character of called ………………… a. Integer b. Char
c. String d. Float

May The Lord Be With You Enjoy Your Easter Festivities


29.Works that qualify for a copyright protection include the following except …………………
a. Musical work b. Computer software c. Choreographic work d. Computer
30.The song written by a popular American musician Justin Bieber “Stay” ; The song and it
lyrics would be protected under ………………………………… a. Copyright b. Patent
c. Trademark d. None of the above
31.The act of displaying, performing, and reproducing a copyright work without permission
from owner constitutes as ………………………………… a. Achievement b. Copyright
Infringement c. Creativity d. Smartness
32.Words such as “Sony”, “Coca-cola”, “Toshiba” and “Apple” fall under which branch of
intellectual property law protection? A. Copyright b. Patent c. Trademark
d. All intellectual property law
33.All the following are video-sharing sites except………………………………… a. YouTube
b. Facebook c. Google+ d. Tiktok
34.………………………………… is a combination of instant messaging and content production.
A. Social networking b. Picture sharing sites c. Video sharing d. Micro
blogging
35.Social media can be accessed through all but one of the above. A. Radio
b. Tablet PC c. Mobile phones d. Laptop computers
36. All are ICT tools with the exception of ………………………………… a. calculator
b. Television c. Remote controller c. Ergonomic chair
37. One way to correct back ache resulting from poor sitting posture is to rely on
………………………………… a. Swivel or ergonomic chairs b. Virtual chair
c. Stools c. Sofas
38.One major effect of watching television over a long period of time continuously can lead
to …………………………… a. Asthma b. Vision impairment
c. Eye cancer d. Brain tumor
39. Any situation that poses danger to our health is considered as …………………………………
a. Health Hazard b. Harm c. Precautions d. Defensive Mechanism
40. Loud volumes from public address system, speaker and mobile phones can lead to
……………….. a. poor vision b. cancer c. Hearing impairment d. Ear cancer

END OF PAPER GOOD LUCK!!

May The Lord Be With You Enjoy Your Easter Festivities

You might also like